Jon Dimaggio

Jon Dimaggio Email and Phone Number

Published Author and Chief Security Strategist at Analyst1 (Author of SANS Difference Maker Award Book of the Year 2022 AND 2023!) Author of the Ransomware Diaries, DEFCON speaker and featured on 60 Minutes. @ Analyst1
Jon Dimaggio's Location
Tampa, Florida, United States, United States
Jon Dimaggio's Contact Details

Jon Dimaggio personal email

Jon Dimaggio phone numbers

About Jon Dimaggio

Jon DiMaggio is the chief security strategist at Analyst1 and has over 15 years of experience hunting, researching, and writing about advanced cyber threats. As a specialist in enterprise ransomware attacks and nation-state intrusions, such as”the SANS winning research series, Ransomware Diaries in addition to Ransom Mafia:Analysis of the World’s first Ransomware Cartel”, and a “History of REvil”. Jon is most known for his two year undercover operation to infiltrate the LockBit ransomware gang, and has aided law enforcement agencies in federal indictments of nation-state attacks, and discussed his work with CBS 60 Minutes, The New York Times, Bloomberg, Fox, CNN, Reuters, the Guardian and Wired. You can find Jon speaking about his research at conferences such as RSA. Additionally, in 2022, Jon authored the book “The Art of Cyberwarfare: An Investigator's Guide to Espionage, Ransomware, and Organized Cybercrime” published by No Starch Press and was awarded the SANs Difference Makers Award in both 2022 and 2023 for his book and the Ransomware Diaries series.

Jon Dimaggio's Current Company Details
Analyst1

Analyst1

View
Published Author and Chief Security Strategist at Analyst1 (Author of SANS Difference Maker Award Book of the Year 2022 AND 2023!) Author of the Ransomware Diaries, DEFCON speaker and featured on 60 Minutes.
Jon Dimaggio Work Experience Details
  • Analyst1
    Chief Security Strategist
    Analyst1 Nov 2020 - Present
    Reston, Virginia, Us
    -Lead researcher and writer at Analyst1-Plan, lead and engage in CTI and HUMINT based engagements against ransomware threat actors-Responsible for all Analyst1 dark web research (SME in TA undercover operations-Conduct thought leadership through speaking engagements, TV appearances, media interviews and podcasts
  • Symantec
    Sr. Threat Intelligence Analyst
    Symantec Oct 2014 - Nov 2020
    San Jose, California, Us
    - Provide leadership and direction to customers and senior leaders in both strategic and tactical response to advanced cyber threats- Lead and manage threat investigations from start to finish- Coordinate/manage reverse engineering requirements for threat research - Provide oversight and ensure analysts present proper analysis and clear messaging within customer reporting- Provide narration of findings and communicate at the appropriate level (tell the story) to senior leaders, technical analysts, media reporters and the general pubic- Provide direction and act as the public facing leader of Symantec’s Attack Investigation Team- Collaborate with industry partners- Brief customers and advise decision makers on cyber threats- Profile threat actors -Identify and document both unique technical and human behaviors to build a digital fingerprint used to identify threat actors
  • Opcentric
    Senior Cyber Threat Intelligence Analyst
    Opcentric May 2013 - Oct 2014
    -Advise customer and senior leadership on Advanced Persistent threat (APT) activity-Provide consulting services to hunt track and report on cyber threat actors-Provide advice to analysts and leadership as a SME on advanced threats-Attend and present at Intelligence Community meetings and conferences- Advise decision makers and analysts on how to prepare and react to various cyber threats -Produce in-depth analytical product reports on cyber threat actors and activity in specific industries relevant to my customer-Created product reports on emerging threats-Provide Open Source Intelligence (OSINT) Analysis and written report products on emerging threat activity based on CND indicators, malware and personas.-Create threat activity diagrams of advanced threat activity against various cyber targets identified through OSINT research-Track Advanced Persistent threats (APT) and identify new TTPs and infrastructure -Senior member on commercial threat intelligence assessments providing intel on APT threats and identifying advanced threats vs. crime ware and other lesser threat activity-Modeling attack activity with threat modeling software-Attributing threat activity to specific advanced threat groups-Reviewing malware and performing dynamic analysis to extract indicators and infrastructure information
  • General Dynamics Information Technology
    Senior Fusion Analyst
    General Dynamics Information Technology Sep 2011 - May 2013
    -Discover, attribute, and identify state sponsored Cyber threats (Track, trend and use predictive analysisbased off Targeting and past TTPs)-Identify Tactics, Techniques, and Procedures of Advanced Persistent Threat (APT) to includeinfrastructure, tools, phishing emails and malware-Document TTP changes and trends of cyber threats-Identify targeting lists used by threat actors (public websites, group membership lists, Conference lists,contract announcements and other sources used for targeting)-Find trends and common relationships (Job, Program, professional membership, common technology,common locations and company’s) in recipients targeted by APT to identify targeting (better view of bigpicture / strategic as opposed to tactical)-Create, edit, and review written reports detailing state sponsored cyber events-Create presentations and brief senior Government and contract personnel-Analyze raw data such as PCAP, True Detect sensor logs, and email headers (Mime and SMTP) toidentify malicious traffic.-Identify originating IP addresses used to send phishing emails (mail relays are often used to hide the truesending IP) and track for trends in APT infrastructure and identify IP origins (location, registrant, ASN, ect)-Conduct Splunk queries, Monitor ArcSight channels (create rules and filters) via the ArcSight EnterpriseSecurity Manager-Submit incident reports to multiple government agencies and collaborate and share information withCDC partners-Participate in Technical forums and exchanges regarding state sponsored actors-Conduct basic malware analysis (dynamic) using tools such as CaptureBat, WireShark, Sysinternals andother dynamic analysis tools.-Identify files dropped, Remote Access Tools (PIVY, SharK Rat, and other custom Rats) used by threatcampaigns-Identify unique attributes in backdoors used by threat actors and provide indicators to defenders
  • Oberon Associates
    Sigint Intelligence Specialist (Cyber)
    Oberon Associates Jun 2009 - Aug 2011
    Us
    -Cyber SIGINT Analyst, reporting to senior Management-Serves as a Signals Intelligence (SIGINT) Analyst technical lead for Support to ComputerNetwork Operations-Produce written SIGINT product reports to assess developments, trends, and threats- Coordinate and facilitate technical developments to support the ability to conduct research withSIGINT support entities-Manage, lead, and develop SIGINT analytic efforts in support computer network operations-Direct/lead SIGINT analytic effort to support and produce intelligence reports and products-Serve as subject matter expert on SIGINT targets and support senior management in briefingand attending high level multi-agency meetings-Execute and utilize management functions to perform SIGINT research and analysis for the development of products.-Support National Systems and agencies in support of intelligence requirementsand reporting criteria-Knowledge in the Defense and National Agency operations, mission, policy, structure and doctrine as well as the utilization of, National Systems and agencies in support of intelligence requirements.
  • Northrop Grumman
    Vulnerability Assessment Program Team Lead
    Northrop Grumman Jul 2007 - May 2009
    Falls Church, Va, Us
    -Senior Computer Network Operations CNO Cyber Threat Lead- Direct and lead Vulnerability Assessments on Information Systems DoD and Intelligence agencynetworks in support of National Agency operations- Assess classified and unclassified networks and systems within the US Cryptologic System and used toproduce US Intelligence Directives, against cyber vulnerabilities and threats.- Write detailed product reports and brief Government customers within the Army, Airforce as well asDefense and National Agency’s- Manage and lead and create policy protect database retrieval systems used to process intelligence dataand provide intelligence support to the warfighter.- Coordinate large scale assessments, with government agencies. Mitigate problems, concerns andbureaucracy involved in assessing another agencies networks
  • Booz Allen Hamilton
    Senior Consultant - Network Security Engineer / Team Lead
    Booz Allen Hamilton Sep 2005 - Jul 2007
    Mclean, Va, Us
    Advisor to government clients for multiple IT security programs. Design and Develop Secure networks.
  • Northrop Grumman
    Network Security Engineer
    Northrop Grumman Dec 2004 - Sep 2005
    Falls Church, Va, Us
    Lead multiple network design initiatives, and opportunities to expand the capabilities of my clients infrastructure to bring new services such as DODIIS Trusted Workstations (DTW), VOIP services, and the expansion of various classified networks.

Jon Dimaggio Skills

Computer Security Vulnerability Assessment Information Assurance Information Security Network Security Security Intelligence Dod Malware Analysis Intrusion Detection Defense Cissp Government Comptia Security+ Computer Forensics Tcp/ip Ids National Security Routers Cisco Routers Network Design Vulnerability Management Cisco Technologies Comptia Security Nist Technical Consultation

Jon Dimaggio Education Details

  • Strayer University
    Strayer University
    Computer And Information Systems Security/Information Assurance
  • Woodbridge Senior High School
    Woodbridge Senior High School

Frequently Asked Questions about Jon Dimaggio

What company does Jon Dimaggio work for?

Jon Dimaggio works for Analyst1

What is Jon Dimaggio's role at the current company?

Jon Dimaggio's current role is Published Author and Chief Security Strategist at Analyst1 (Author of SANS Difference Maker Award Book of the Year 2022 AND 2023!) Author of the Ransomware Diaries, DEFCON speaker and featured on 60 Minutes..

What is Jon Dimaggio's email address?

Jon Dimaggio's email address is jo****@****ail.com

What is Jon Dimaggio's direct phone number?

Jon Dimaggio's direct phone number is +165052*****

What schools did Jon Dimaggio attend?

Jon Dimaggio attended Strayer University, Woodbridge Senior High School.

What skills is Jon Dimaggio known for?

Jon Dimaggio has skills like Computer Security, Vulnerability Assessment, Information Assurance, Information Security, Network Security, Security, Intelligence, Dod, Malware Analysis, Intrusion Detection, Defense, Cissp.

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.